Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 65

Full-Text Articles in Physical Sciences and Mathematics

The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi Jan 2023

The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi

Publications

As artificial intelligence (AI) seeks to improve modern society, the commercial aviation industry offers a significant opportunity. Although many parts of commercial aviation including maintenance, the ramp, and air traffic control show promise to integrate AI, the highly computerized digital flight deck (DFD) could be challenging. The researchers seek to understand what role AI could provide going forward by assessing AI evolution on the commercial flight deck over the past 50 years. A modified SHELL diagram is used to complete a Human Factors (HF) analysis of the early use for AI on the commercial flight deck through introduction of the …


The Data Analytics And The Science Revolution, Leila Halawi, Amal Clarke, Kelly George Feb 2022

The Data Analytics And The Science Revolution, Leila Halawi, Amal Clarke, Kelly George

Publications

This text highlights the difference between analytics and data science, using predictive analytic techniques to analyze different historical data, including aviation data and concrete data, interpreting the predictive models, and highlighting the steps to deploy the models and the steps ahead. The book combines the conceptual perspective and a hands-on approach to predictive analytics using SAS VIYA, an analytic and data management platform. The authors use SAS VIYA to focus on analytics to solve problems, highlight how analytics is applied in the airline and business environment, and compare several different modeling techniques. They decipher complex algorithms to demonstrate how they …


Aessa Young Professionals Forum Webinar “Technologies And Skills That Will Gearup The Aerospace Industry Post Pandemic” - A Global Perspective With An Emphasis On South Africa October 2021, Linda Vee Weiland Oct 2021

Aessa Young Professionals Forum Webinar “Technologies And Skills That Will Gearup The Aerospace Industry Post Pandemic” - A Global Perspective With An Emphasis On South Africa October 2021, Linda Vee Weiland

Publications

A webinar presentation for AeSSA Young Professionals.


Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri May 2021

Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri

Publications

As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.


Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri Apr 2021

Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri

Publications

The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …


Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera Jan 2021

Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera

Publications

System and techniques for reduced multiplicative complex­ity discrete cosine transform (DCT) circuitry are described herein. An input data set can be received and, upon the input data set, a self-recursive DCT technique can be performed to produce a transformed data set. Here, the self-recursive DCT technique is based on a product of factors of a specified type of DCT technique. Recursive components of the technique are of the same DCT type as that of the DCT technique. The transformed data set can then be produced to a data con­sumer.


Cyber Insurance Effects On Cyber Hygiene: Does The Homeostatic Effect Apply?, Wendi M. Kappers, Aaron Glassman, Michael S. Wills Jan 2021

Cyber Insurance Effects On Cyber Hygiene: Does The Homeostatic Effect Apply?, Wendi M. Kappers, Aaron Glassman, Michael S. Wills

Publications

A theoretical framework and research strategy is proposed to gain insight into perceptions and decisions as to how SMBs make decisions regarding cybersecurity hygiene measures, which could lead to betterinformed decisions regarding insurance as part of an ISA program, as well as have a bearing on policy structures and pricing for such insurance. This is because the definition of “cybersecurity hygiene habits”(CHH) as a task appears to vary within the industry and makes the practice hard to measure and evaluate. Research suggests that there may be a poorly understood connection between CHHs undertaken by organizations and their perceptions and/or adoption …


Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu Oct 2020

Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu

Publications

A sliding mode observer is presented, which is rigorously proven to achieve finite-time state estimation of a dual-parallel underactuated (i.e., single-input multi-output) cart inverted pendulum system in the presence of parametric uncertainty. A salient feature of the proposed sliding mode observer design is that a rigorous analysis is provided, which proves finite-time estimation of the complete system state in the presence of input-multiplicative parametric uncertainty. The performance of the proposed observer design is demonstrated through numerical case studies using both sliding mode control (SMC)- and linear quadratic regulator (LQR)-based closed-loop control systems. The main contribution presented here is the rigorous …


From Degree To Chief Information Security Officer (Ciso): A Framework For Consideration, Wendi M. Kappers, Martha Nanette Harrell, Jun 2020

From Degree To Chief Information Security Officer (Ciso): A Framework For Consideration, Wendi M. Kappers, Martha Nanette Harrell,

Publications

Educational entities are establishing program degree content designed to ensure cybersecurity and information security assurance skills are adequate and efficient for preparing students to be successful in this very important field. Many Master’s level programs include courses that address these skills in an attempt to provide a well-rounded program of study. However, undergraduates who are in the practitioner’s world have other alternatives to gain these skills. These individuals can gain various certifications, such as the Certified Information Systems Security Professional (CISSP) or the Certified Information Security Manager (CISM). Due to a perceived gap between academics and field knowledge, it appears …


W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel Mar 2020

W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel

Publications

Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the dynamic …


Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng Feb 2020

Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng

Publications

The proliferation of mobile devices that support the acceleration of data services (especially smartphones) has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceeding the throughput of the backhaul. To improve spectrum utilization and increase mobile network traffic, in combination with content caching, we study the cooperation between primary and secondary networks via content caching. We consider that the secondary base station assists the primary user by pre-caching some popular primary contents. Thus, the secondary base station can obtain more licensed bandwidth to serve its own user. We mainly focus on the time delay …


Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang Jan 2020

Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang

Publications

Deep learning is increasingly applied to safety-critical application domains such as autonomous cars and medical devices. It is of significant importance to ensure their reliability and robustness. In this paper, we propose DLFuzz, the coverage guided differential adversarial testing framework to guide deep learing systems exposing incorrect behaviors. DLFuzz keeps minutely mutating the input to maximize the neuron coverage and the prediction difference between the original input and the mutated input, without manual labeling effort or cross-referencing oracles from other systems with the same functionality. We also design multiple novel strategies for neuron selection to improve the neuron coverage. The …


Monte Carlo Simulations Of Coupled Transient Seepage Flow And Compressive Stress In Levees, Fred Thomas Tracy, Ghada Ellithy, Jodi L. Ryder, Martin T. Schultz, Benjamin R. Breland, T. Chris Massey, Maureen K. Corcoran Jan 2020

Monte Carlo Simulations Of Coupled Transient Seepage Flow And Compressive Stress In Levees, Fred Thomas Tracy, Ghada Ellithy, Jodi L. Ryder, Martin T. Schultz, Benjamin R. Breland, T. Chris Massey, Maureen K. Corcoran

Publications

The purpose of this research is to compare the results from two different computer programs of flow analyses of two levees at Port Arthur, Texas where rising water of a flood from Hurricane Ike occurred on the levees. The first program (Program 1) is a two-dimensional (2-D) transient finite element program that couples the conservation of mass flow equation with accompanying hydraulic boundary conditions with the conservation of force equations with accompanying x and y displacement and force boundary conditions, thus yielding total head, x displacement, and y displacement as unknowns at each finite element node. The second program (Program …


Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo Dec 2019

Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo

Publications

Fuzzing is one of the most effective vulnerability detection techniques, widely used in practice. However, the performance of fuzzers may be limited by their inability to pass complicated checks, inappropriate mutation frequency, arbitrary mutation strategy, or the variability of the environment. In this paper, we present DeepFuzzer, an enhanced greybox fuzzer with qualified seed generation, balanced seed selection, and hybrid seed mutation. First, we use symbolic execution in a lightweight approach to generate qualified initial seeds which then guide the fuzzer through complex checks. Second, we apply a statistical seed selection algorithm to balance the mutation frequency between different seeds. …


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Jul 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Publications

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Jul 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Publications

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …


Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi Apr 2019

Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi

Publications

Automobile Insurance fraud costs the insurance industry billions of dollars annually. This case study addresses claim fraud based on data extracted from Alpha Insurance’s automobile claim database. Students are provided the business problem and data sets. Initially, the students are required to develop their hypotheses and analyze the data. This includes identification of any missing or inaccurate data values and outliers as well as evaluation of the 22 variables. Next students will develop and optimize their predictive models using five techniques: regression, decision tree, neural network, gradient boosting, and ensemble. Then students will determine which model is the best fit …


Cybersecurity In The Maritime Domain, Gary C. Kessler Apr 2019

Cybersecurity In The Maritime Domain, Gary C. Kessler

Publications

In 2017 and 2018, the maritime industry saw a record number of attempted—and many successful—frauds via email, phishing, or other means. Demonstrated and actual attacks on vessel networks, communication systems, and navigation systems have become practically routine. Port and shipping line networks are increasingly vulnerable to what appears to be increasingly targeted attacks against maritime systems.


An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler Jan 2019

An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler

Publications

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered here only describe the first of many steps necessary for better security in any number of situations.


Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, Elena Vishnevskaya, Ian Mcandrew, Michael Johnson Jan 2019

Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, Elena Vishnevskaya, Ian Mcandrew, Michael Johnson

Publications

Aviation manufacturing is at the leading edge of technology with materials, designs and processes where automation is not only integral; but complex systems require more advanced systems to produce and verify processes. Critical Infrastructure theory is now used to protect systems and equipment from external software infections and cybersecurity techniques add an extra layer of protection. In this research, it is argued that Artificial Intelligence can reduce these risks and allow complex processes to be less exposed to the threat of external problems, internal errors or mistakes in operation.


Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro Jan 2018

Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro

Publications

A system including at least first and second wearable mobile devices and optionally one or more smartphones or other computing devices for allowing a wearable mobile device wearer, an on-site observer, and a remote observer to research and test usability of products in mobile settings, mobile applications, mobile devices, and wearable mobile devices, desktop usability settings, and other settings and devices. The devices nm a software application for generating first-person video and third-person video, transmitting the video to the other devices, marking the videos with time stamps, and allowing the remote observer to send messages and other information to the …


Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne Jan 2018

Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne

Publications

The incidence of musculoskeletal disorders in workplaces with difficult ergonomic conditions is increasing. Today, there is a growing market for technical support systems that avoid repetitive strain on the musculoskeletal system. We have been observing two (parallel) lines of development: on the one hand, the development of exoskeletons supporting shop floor operators and, on the other hand, the development of collaborative robots for the creation of hybrid teams. The focus of our research is the combined application of exoskeletons AND collaborative robots for shop floor operators in the aerospace industry. Our approach is to analyze various scenarios to understand which …


Software Safety And Security Risk Mitigation In Cyber-Physical Systems, Miklos Biro, Atif Mashkoor, Johannes Sametinger, Remzi Seker Jan 2018

Software Safety And Security Risk Mitigation In Cyber-Physical Systems, Miklos Biro, Atif Mashkoor, Johannes Sametinger, Remzi Seker

Publications

Cyber-physical systems (CPSs) offer many opportunities but pose many challenges--especially regarding functional safety, cybersecurity, and their interplay, as well as the systems' impact on society. Consequently, new methods and techniques are needed for CPS development and assurance. This article [and issue] aims to address some of these challenges.


Evaluating Student Perceptions And Learning Outcomes: Differences Between Sla-Able And Non-Sla-Able Introductory Programming Courses, Christina M. Frederick, Matthew B. Pierce, Andrew Griggs, Lulu Sun Sep 2017

Evaluating Student Perceptions And Learning Outcomes: Differences Between Sla-Able And Non-Sla-Able Introductory Programming Courses, Christina M. Frederick, Matthew B. Pierce, Andrew Griggs, Lulu Sun

Publications

Engineering, computer science and subsequently knowledge of programming language is an increasingly vital skill in today’s workforce. First year engineering students are introduced to programming in addition to rigorous course loads in their first year. Second Language Acquisition (SLA) has been applied to programming course content delivery and has shown promise as an effective means of better educating new students. Results will be presented from a NSF funded study conducted over the past two years. SLA was applied to an introductory engineering course that teaches basic programming skills in a Blended learning environment (SLA-aBLe). This study examined four semesters worth …


Trustworthiness Requirements For Manufacturing Cyber-Physical Systems, Radu F. Babiceanu, Remzi Seker Jan 2017

Trustworthiness Requirements For Manufacturing Cyber-Physical Systems, Radu F. Babiceanu, Remzi Seker

Publications

Distributed manufacturing operations include cyber-physical systems vulnerable to cyber-attacks. Long time not considered a priority, cybersecurity jumped to the forefront of manufacturing concerns due to the need to network together legacy, newer equipment, and entire operation centers. This paper proposes trustworthiness solutions for integrated manufacturing physical-cyber worlds, where trustworthiness is defined to complement system dependability requirements with cybersecurity requirements, such that the resulting manufacturing cyber-physical system delivers services that can justifiably be trusted. Acknowledging the inevitability of cyber-attacks, the paper models the cybersecurity component using the resilient systems framework, where system resilience is viewed as preservation of a required state …


Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson Jan 2017

Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson

Publications

Historically, information systems have focused on capturing, storing, managing, and reporting explicit knowledge. Organizations today recognize the need to integrate both explicit and tacit knowledge in formal information systems. Knowledge management continues to be a critical strategy for an organization to achieve a sustainable competitive advantage, and consequently succeed in today's knowledge-based economy. Knowledge management systems (KMS) are a class of information systems that manage, store and distribute knowledge. Knowledge management systems have proliferated in practice. In turn, theoretical research on knowledge management and knowledge management systems has proliferated. Knowledge management systems have emerged as powerful sources of competitive advantage. …


Exploring Myths In Digital Forensics: Separating Science From Ritual, Gary C. Kessler, Gregory H. Carlton Jan 2017

Exploring Myths In Digital Forensics: Separating Science From Ritual, Gary C. Kessler, Gregory H. Carlton

Publications

Digital forensic methodology deviates significantly relative to the methods of other forensic sciences for numerous practical reasons, and it has been largely influenced by factors derived from the inception and evolution of this relatively new and rapidly changing field. Digital forensics methodology was developed more by practitioners in its early days rather than by computer scientists. This led to accepted best practices in the field that may not represent the best or, at least, tested, science. This paper explores some of these differences in the practice and evolution between digital and other forensic sciences, and recommends scientific approaches to apply …


Using Journals To Assess Non-Stem Student Learning In Stem Courses: A Case Study In Cybersecurity Education, Gary Kessler, Glenn S. Dardick, Douglas L. Holton Jan 2017

Using Journals To Assess Non-Stem Student Learning In Stem Courses: A Case Study In Cybersecurity Education, Gary Kessler, Glenn S. Dardick, Douglas L. Holton

Publications

Embry-Riddle Aeronautical University offers a minor course of study in cybersecurity as an option in our undergraduate Homeland Security program. Since the students are, by and large, social scientists, the focus of the program is to build hyper-awareness of how cybersecurity integrates within their professional aspirations rather than to provide cybersecurity career-level proficiency. Assessing student learning of the technical aspects cannot be performed using traditional tests, as they would not properly measure what the students are learning in a practical sense. Instead, we employ journals and self-reflection to ask the students to express and demonstrate their learning. Although somewhat harder …


Aviation And Cybersecurity: Opportunities For Applied Research, Jon Haass, Radhakrishna Sampigethaya, Vincent Capezzuto Jul 2016

Aviation And Cybersecurity: Opportunities For Applied Research, Jon Haass, Radhakrishna Sampigethaya, Vincent Capezzuto

Publications

Aviation connects the global community and is moving more people and payloads faster than ever. The next decade will experience an increase in manned and unmanned aircraft and systems with new features and unprecedented applications. Cybertechnologies—including software, computer networks, and information technology—are critical and fundamental to these advances in meeting the needs of the aviation ecosystem of aircraft, pilots, personnel, passengers, stakeholders, and society. This article discusses current and evolving threats as well as opportunities for applied research to improve the global cybersecurity stance in the aviation and connected transportation industry of tomorrow.


Development And Use Of A Tablet-Based Resuscitation Sheet For Improving Outcomes During Intensive Patient Care, Wasif Bokahri, Vimla L. Patel, Ashish Amresh, Ayan Sen Apr 2016

Development And Use Of A Tablet-Based Resuscitation Sheet For Improving Outcomes During Intensive Patient Care, Wasif Bokahri, Vimla L. Patel, Ashish Amresh, Ayan Sen

Publications

Data documentation from resuscitation events in hospitals, termed "code blue" events, utilizes a paper form, which is institution-specific. Problems with data capture and transcription exists, due to the challenges of dynamic documentation of patient, event and outcome variables as the code blue event unfolds. We hypothesize that an electronic version of code blue real-time data capture would lead to improved resuscitation data transcription, and enable clinicians to address deficiencies in quality of care. To this effect, we present the design of a tablet-based application and its use by 20 nurses at the Mayo Clinic hospital. The results showed that the …